It's possible that there are different device ids. Example for baytrail there are multiple ids. You need to add the did specific to your soc & build flashrom & use that.
Did you figureout where is BIOS_CNTRL.LE bit is getting set. FSPS or in Coreboot ? We need to prevent the bit from setting. As per flashrom logs you provided, bios_cntrl reg is at 0xab(10101011b) & this needs to be set to 0x89(10001001b) As mentioned earlier, enable smm logs, run flashrom & see in logs what fw is trying to do. On Wed, Nov 11, 2020 at 7:16 PM Balaji Sivakumar <[email protected]> wrote: > Naresh, > > Regarding adding support for denverton soc in flashrom, I could see a > patch in flashrom but device id seems to be incorrect one. Any comments on > this patch, as per soc device id should be 0x19e0. > https://github.com/flashrom/flashrom/pull/58/commits > > Thanks > Bealaji > > On Thu, Oct 22, 2020 at 6:42 PM Balaji Sivakumar <[email protected]> > wrote: > >> Naresh, >> >> I have added Denverton support in the flashrom and I found that SMM >> Protection is enabled from the logs. >> >> I have tried to disable it using setcpi utility and it remains the same >> value. Also the flashrom utility also tries but it remains the same. >> >> Warning: BIOS region SMM protection is enabled! >> Warning: Setting Bios Control at 0xdc from 0xab to 0x89 failed. >> >> Also FLOCKDN=1 is set as 1 as well. >> >> I can clearly tell the BIOS region is read and writable but Protected >> registers are read only that's also the reason I am not able to write the >> BIOS region. >> >> What are the options/methods to unlock / disable the Bios Write >> enable(BIOS_CNTL) or to access the HSFS registers to set the FLOCKDN bit to >> 0. >> >> Any pointers would be appreciated! >> >> Thanks, >> Balaji >> >> >> >> On Wed, Oct 14, 2020 at 12:42 PM Balaji Sivakumar < >> [email protected]> wrote: >> >>> Thanks Naresh for the details. I will add the support in the flashrom >>> and test it. >>> >>> >>> >>> On Wed, Oct 14, 2020 at 11:34 AM Naresh G. Solanki < >>> [email protected]> wrote: >>> >>>> Since its using intel-spi driver, try to get kernel log(especially >>>> intel-spi driver logs) to understand the failure. >>>> OR >>>> Unload intel-spi driver & run flashrom(with verbose output) so that it >>>> can use chipset_flash_enable. >>>> Note: To add support for this SoC in flashrom, you may have to add >>>> below line in chipset_enable.c >>>> {0x8086, 0x19e0, B_S, DEP, "Intel", "Denverton", enable_flash_pch100}, >>>> & compile flashrom. >>>> >>>> Regards, >>>> Naresh >>>> >>>> On Wed, Oct 14, 2020 at 9:03 PM Balaji Sivakumar < >>>> [email protected]> wrote: >>>> >>>>> Hi Naresh, >>>>> >>>>> Please find the details. >>>>> >>>>> 1.Platform/SOC ? -> Intel atom Denverton c3508 >>>>> 2. Verbose flashrom output(append -VVV in commandline) >>>>> >>>>> # flashrom -p internal -w coreboot.rom -VVV >>>>> flashrom v1.1 on Linux 5.4.45 (x86_64) >>>>> flashrom is free software, get the source code at https://flashrom.org >>>>> >>>>> flashrom was built with libpci 3.5.5, GCC 8.4.0, little endian >>>>> Command line (5 args): flashrom -p internal -w coreboot.rom -VVV >>>>> Using clock_gettime for delay loops (clk_id: 1, resolution: 1ns). >>>>> Initializing internal programmer >>>>> get_mtd_info: device_name: "BIOS", is_writeable: 1, numeraseregions: >>>>> 0, total_size: 16777216, erasesize: 65536 >>>>> Opened /dev/mtd0 successfully >>>>> The following protocols are supported: Programmer-specific. >>>>> Probing for Programmer Opaque flash chip, 0 kB: Found Programmer flash >>>>> chip "Opaque flash chip" (16384 kB, Programmer-specific) mapped at >>>>> physical >>>>> address 0x0000000000000000. >>>>> Found Programmer flash chip "Opaque flash chip" (16384 kB, >>>>> Programmer-specific). >>>>> coreboot last image size (not ROM size) is 16777216 bytes. >>>>> page_size=1000 >>>>> pre-rounding: start=0x00000000ff000000, len=0x1000000, >>>>> end=0x0000000100000000 >>>>> post-rounding: start=0x00000000ff000000, len=0x1000000, >>>>> end=0x0000000100000000 >>>>> programmer_map_flash_region: mapping Opaque flash chip from >>>>> 0x00000000ff000000 to 0x00007f0e65645000 >>>>> Reading old flash chip contents... done. >>>>> Erasing and writing flash chip... Trying erase function 0... >>>>> 0x000000-0x00ffff:Elinux_mtd_erase: ioctl: Input/output error >>>>> Reading current flash chip contents... done. Looking for another erase >>>>> function. >>>>> Trying erase function 1... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 2... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 3... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 4... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 5... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 6... not defined. Looking for another erase >>>>> function. >>>>> Trying erase function 7... not defined. No usable erase functions left. >>>>> FAILED! >>>>> Uh oh. Erase/write failed. Checking if anything has changed. >>>>> Reading current flash chip contents... done. >>>>> Good, writing to the flash chip apparently didn't do anything. >>>>> This means we have to add special support for your board, programmer >>>>> or flash >>>>> chip. Please report this on IRC at chat.freenode.net (channel >>>>> #flashrom) or >>>>> mail [email protected], thanks! >>>>> >>>>> ------------------------------------------------------------------------------- >>>>> You may now reboot or simply leave the machine running. >>>>> page_size=1000 >>>>> pre-rounding: start=0x00007f0e65645000, len=0x1000000, >>>>> end=0x00007f0e66645000 >>>>> post-rounding: start=0x00007f0e65645000, len=0x1000000, >>>>> end=0x00007f0e66645000 >>>>> programmer_unmap_flash_region: unmapped 0x00007f0e65645000 >>>>> >>>>> >>>>> >>>>> On Wed, Oct 14, 2020 at 9:54 AM Naresh G. Solanki < >>>>> [email protected]> wrote: >>>>> >>>>>> Can you provide info below: >>>>>> 1. Platform/SoC ? >>>>>> 2. Verbose flashrom output(append -VVV in commandline) >>>>>> >>>>>> Regards, >>>>>> Naresh >>>>>> >>>>>> On Wed, Oct 14, 2020 at 8:03 PM Balaji Sivakumar < >>>>>> [email protected]> wrote: >>>>>> >>>>>>> Hello Everyone, >>>>>>> >>>>>>> We are using SPI flash(Macronix) to program the BIOS. And we use an >>>>>>> external programmer to flash the BIOS (coreboot including FD+ME) into >>>>>>> SPI >>>>>>> Flash (16384 kB, SPI), it works fine and boots well. The board is >>>>>>> functional and we have successfully booted a kernel on it. >>>>>>> >>>>>>> Am working on adding a feature to upgrading the BIOS (complete >>>>>>> IFD+ME+Coreboot) using intel-spi driver at the OS level. Able to >>>>>>> successfully take the backup full 16MB spi nor flash data which >>>>>>> includes IFD+ME+BIOS using flashrom Internal Programmer option and >>>>>>> it is identified as Opaque flash chip and using dd command as well. >>>>>>> >>>>>>> But we are seeing the erase fail through both flashrom and >>>>>>> flash_erase utility. I believe it fails to erase at the flash descriptor >>>>>>> location. >>>>>>> >>>>>>> As far as Read/Write access to the SPI regions, I have enabled the >>>>>>> Host CPU BIOS write access and ME Master Access as 0xFFFF through Intel >>>>>>> FIT >>>>>>> Tool but still not able to erase it and it fails. >>>>>>> >>>>>>> Is there anything that could be preventing to enable read/write >>>>>>> access to the Intel flash descriptor or any SOC SPI controller >>>>>>> protection >>>>>>> to access the Flash descriptor? >>>>>>> >>>>>>> Any pointers would be appreciated. >>>>>>> >>>>>>> Thanks >>>>>>> Balaji >>>>>>> _______________________________________________ >>>>>>> coreboot mailing list -- [email protected] >>>>>>> To unsubscribe send an email to [email protected] >>>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> Best regards, >>>>>> Naresh G. Solanki >>>>>> >>>>> >>>>> >>>>> -- >>>>> Thanks, >>>>> Balaji >>>>> +1-319-573-9768 >>>>> >>>> >>>> >>>> -- >>>> Best regards, >>>> Naresh G. Solanki >>>> >>> >>> >>> -- >>> Thanks, >>> Balaji >>> >>> >> >> -- >> >> -- > Thanks, > Balaji > +1-319-573-9768 > -- Best regards, Naresh G. Solanki
_______________________________________________ coreboot mailing list -- [email protected] To unsubscribe send an email to [email protected]

